Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Keycloak - Identity and Access Management for Modern Applications
Keycloak - Identity and Access Management for Modern Applications

Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications , Second Edition

Arrow left icon
Profile Icon Stian Thorgersen Profile Icon Pedro Igor Silva
Arrow right icon
$43.99
Full star icon Full star icon Full star icon Full star icon Half star icon 4.3 (28 Ratings)
eBook Jul 2023 350 pages 2nd Edition
eBook
$43.99
Paperback
$54.99
Subscription
Free Trial
Renews at $12.99p/m
Arrow left icon
Profile Icon Stian Thorgersen Profile Icon Pedro Igor Silva
Arrow right icon
$43.99
Full star icon Full star icon Full star icon Full star icon Half star icon 4.3 (28 Ratings)
eBook Jul 2023 350 pages 2nd Edition
eBook
$43.99
Paperback
$54.99
Subscription
Free Trial
Renews at $12.99p/m
eBook
$43.99
Paperback
$54.99
Subscription
Free Trial
Renews at $12.99p/m

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Key benefits

  • A beginners’ guide to Keycloak focussed on understanding Identity and Access Management
  • Implement authentication and authorization in applications using Keycloak 22
  • Utilize Keycloak in securing applications developed by you and the existing applications in your enterprise

Description

The second edition of Keycloak - Identity and Access Management for Modern Applications is an updated, comprehensive introduction to Keycloak and its updates. In this new edition, you will learn how to use the latest distribution of Keycloak. The recent versions of Keycloak are now based on Quarkus, which brings a new and improved user experience and a new admin console with a higher focus on usability. You will see how to leverage Spring Security, instead of the Keycloak Spring adapter while using Keycloak 22. As you progress, you’ll understand the new Keycloak distribution and explore best practices in using OAuth. Finally, you'll cover general best practices and other information on how to protect your applications. By the end of this new edition, you’ll have learned how to install and manage the latest version of Keycloak to secure new and existing applications using the latest features.

Who is this book for?

This book is for developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security. Basic knowledge of app development, authentication, and authorization is expected.

What you will learn

  • Understand how to install, configure, and manage the latest version of Keycloak
  • Discover how to obtain access tokens through OAuth 2.0
  • Utilize a reverse proxy to secure an application implemented in any programming language or framework
  • Safely manage Keycloak in a production environment
  • Secure different types of applications, including web, mobile, and native applications
  • Discover the frameworks and third-party libraries that can expand Keycloak

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Jul 31, 2023
Length: 350 pages
Edition : 2nd
Language : English
ISBN-13 : 9781804612613
Vendor :
Red Hat
Category :
Concepts :
Tools :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Product Details

Publication date : Jul 31, 2023
Length: 350 pages
Edition : 2nd
Language : English
ISBN-13 : 9781804612613
Vendor :
Red Hat
Category :
Concepts :
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$12.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 6,500+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$129.99 billed annually
Feature tick icon Unlimited access to Packt's library of 6,500+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts
$179.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 6,500+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total $ 154.97
Mastering Linux Security and Hardening
$49.99
Keycloak - Identity and Access Management for Modern Applications
$54.99
The Ultimate Docker Container Book
$49.99
Total $ 154.97 Stars icon
Visually different images

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.3
(28 Ratings)
5 star 67.9%
4 star 14.3%
3 star 7.1%
2 star 3.6%
1 star 7.1%
Filter icon Filter
Top Reviews

Filter reviews by




David Junior Dec 10, 2023
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This book provides a thorough understanding of Keycloak, OAuth 2.0, and OpenID Connect (OIDC), delving into the intricacies of each concept and their practical applications. The author employs a practical approach by developing a simple web application to illustrate the implementation of Keycloak's OAuth protocol. Every endpoint and token is meticulously examined, ensuring that readers gain a solid foundation in authentication and authorization mechanisms.
Feefo Verified review Feefo
Jerry W Chapman Aug 28, 2023
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I would recommend this book for anyone wanting to learn KeyCloak or get a base understanding of Access Management.I found this book to be a good read, and easy to follow with a lot of examples and walkthroughs!I found the baseline standards descriptions to be very clear and detailed. Later chapters provided solid strategy for deploying KeyCloak and understanding how to deploy most Access Management solutions.Finally, the authors gave enough information to provide extensibility. However, the only thing I think missing in the book was API integration. Driving how to incorporate external signals to drive Session Management or Authentication and Authorization flows to support a larger CyberSecurity effort!
Amazon Verified review Amazon
MJSzemak Sep 04, 2023
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Keycloak – Identity and Access Management for Modern Applications by Stian Thorgersen and Pedro Igor Silva, is a great book that covers the IAM tool. It is tailored for modern applications like single-page and mobile apps, and APIs. This is a tool that I have been looking forward to learning more in-depth about, and this book is a great resource. Chapters 2 and 3 were ones I found very informative. Chapter 2 of the book, titled "Securing Your First Application," explains the process of securing an application using Keycloak. This is demonstrated through a sample application with a single page and REST API. Chapter 3, titled "Brief Introduction to Standards," provides a concise overview and comparison of the standards supported by Keycloak. This helps readers understand how Keycloak facilitates the secure integration of their applications with ease
Amazon Verified review Amazon
Jaouher Oct 15, 2023
Full star icon Full star icon Full star icon Full star icon Full star icon 5
"Keycloak – Identity and Access Management for Modern Applications" penned by Stian Thorgersen and Pedro Igor Silva, thoroughly canvasses the intricate world of identity and access management (IAM) through the lens of Keycloak, a renowned open-source IAM tool. Having personally delved into Keycloak’s functionalities and features as an experienced user, administrator, and developer for its extensions, the book catered a blend of refreshing insights and elementary overlooks to me.The authors astutely break down the IAM's complexities, intertwining them with the Keycloak environment, which has evolved substantially since its inauguration as a community project.The book's encompassing nature brilliantly scaffolds across varied IAM technologies, such as OpenID and OAuth 2.0, offering an enlightening primer that proves instrumental for anyone—be they novices or experts—navigating through the manifold aspects of IAM solutions. Keycloak, with its budget-friendly open-source format, facilitates businesses to wield a potent IAM solution, enabling robust capabilities and heightened visibility within applications and systems.However, as an individual who has navigated the multifaceted corridors of Keycloak, I found the exposition of certain concepts sought a deeper dive. The writers indeed present most chapters with holistic examples, including requirements and downloadable sample code, thus providing a hands-on learning experience, which is pivotal for engineers and developers alike. The blend of contextual whys and hows certainly aid in comprehending Keycloak’s functionality, yet the desire for more lingered.One suggestion for future editions would be the incorporation of additional visual aids like diagrams or illustrative examples for some of the more convoluted concepts that sometimes prove elusive in a textual format. The practical application of knowledge is amplified when visual cues are utilized, particularly in complex concepts like scops, etc.Moreover, the book establishes itself as a valuable resource, providing a robust entry point for those initiating their exploration into Keycloak. However, for those deeply entrenched in its ecosystem and seeking advanced, nuanced insights beyond standard documentation and readily available online information, it may fall a bit short. This dichotomy suggests that a potential subtitle or indicator might be apt, such as "Keycloak – Identity and Access Management for Modern Applications: A Comprehensive Guide for Beginner to Intermediate Levels," to clearly communicate the target audience and depth of content explored within its pages.In sum, "Keycloak – Identity and Access Management for Modern Applications" notably serves as a valuable read for those new or moderately acquainted with IAM tools, keen to delve into the capabilities provided by Keycloak and similar systems. For seasoned veterans in the field, the book may proffer fewer new horizons to explore but stands as a comprehensive refresher and a testament to Keycloak’s journey and evolution in the IAM realm. The book indeed makes implementation comprehensible and accessible to all, yet leaves a sliver of want for more in-depth, advanced explorations into the tool’s expansive capabilities.J.K.
Amazon Verified review Amazon
Marc Oct 18, 2023
Full star icon Full star icon Full star icon Full star icon Full star icon 5
[Disclosure: I received a reviewer's copy as I have relevant domain expertise. I did not receive any compensation nor was my review vetted, so it is solely my own view.]As a preface to my review, my view is that this book is aimed squarely at those who want a pragmatic and practical guide to Keycloak best practices, ensuring a robust and production-grade deployment. Hence, it is ideal for developers and architects who want to make the most of Keycloak and do not already have an in-depth knowledge of SSO concepts. If you are looking for a compendium on writing Keycloak extensions, or deep theory on security protocols, this is not the book for you. That said, even if you are already familiar with the landscape more broadly, you will likely find some useful nuggets in this book.The book begins by outlining the basic premise of SSO, and the philosophy of Keycloak. In short, security is hard to get right; don't try to implement it yourself, it's far safer to delegate to a dedicated platform.At the outset, there is a quick-fire review of the essential concepts and protocols, enabling readers who have a technical background (but not necessarily security-specific expertise) to quickly familiarise themselves. If you are confused by seemingly endless list of standards and protocols, and want to understand how they all relate to each other (OAuth2, OIDC, JWT, JWKS, JWK , ... etcetera) within the Keycloak context, this publication is useful.Throughout, the content is direct, practical, and pragmatic focus, summarising the essential information to make good engineering and architectural decisions quickly. It is not prosaic or theoretical, but instead outlines a range of common scenarios and provides recommended solutions — and perhaps more importantly — explicitly tells you what not to do.For example, recommendations are made for web applications, native applications, mobile applications, and several other categories. For each, recommendations are made, and includes sequence and flow diagrams outlining the protocol interactions. Typically, several alternatives are also proposed for cases where the best approach may be impractical.Let's say you want to know what the best practices and correct auth flows for a mobile application, this book tells you exactly what you need without any rambling.A significant proportion of content is focussed on real-world operational needs and best practices. For example, there are chapters on:• Language and framework-specific examples and integrations, this is more tutorial style, and you will likely want to skip directly to the relevant section for your requirements (Go, Java, Javascript, Quarkus, Spring Boot, etc).• Customisation and extensibility, including visual customisations, flow and approval customisations, etc. Although, I would note that this is not aimed at developers who want to write complex extensions — this is primarily how to drive Keycloak's "out of the box" functionality.• Configuring a production-grade secure server, and tackling some common difficulties (such as handling proxies, internal vs external network, etc)In summation, this is a pragmatic guide to Keycloak for devs, ops, and architects. It is not aimed at advanced developers looking to write Keycloak extensions. It condenses together best practices into a single reference handbook that is ideal to get your team up to speed extremely quickly and ensure you are using best practices from day one.I hope this review helps!
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.